Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 61 to 70
Attackers Exploit Flaw In GDPR-themed WordPress Plugin To Hijack Websites
13th Nov 2018 [26 days ago] from ESET Research
The campaign’s goals aren’t immediately clear, as the malefactors don’t appear to be leveraging the hijacked websites for further nefarious purposes The post Attackers exploit flaw in GDPR-themed WordPress plugin to hijack websites...
Using Machine Learning To Cluster Malicious Network Flows From Gh0st RAT Variants
13th Nov 2018 [27 days ago] from TrendMicro
Cybercriminals have become more and more creative and efficient in their efforts to successfully bypass network security. Reports of unauthorized network intrusions that have compromised enterprise security, resources, and data, plague...
Malware Of The 90s: Remembering The Michelangelo And Melissa Viruses
12th Nov 2018 [28 days ago] from ESET Research
A look back at two of the most damaging malicious codes of the 1990s The post Malware of the 90s: Remembering the Michelangelo and Melissa viruses appeared first on WeLiveSecurity
Google’s Data Charts Path To Avoiding Malware On Android
12th Nov 2018 [28 days ago] from ESET Research
How much higher are the odds that your device will be exposed to malware if you download apps from outside Google Play or if you use one of Android’s older versions? Google has the numbers The post Google’s data charts path to avoiding...
Hide And Script: Inserted Malicious URLs Within Office Documents’ Embedded Videos
12th Nov 2018 [28 days ago] from TrendMicro
In late October, security researchers from Cymulate showed a proof of concept (PoC) exploiting a logic bug that could allow hackers to abuse the online video feature in Microsoft Office to deliver malware. We indeed identified an in-the-wild...
Bug Bounty Hunter Ran ISP Doxing Service
9th Nov 2018 [one month ago] from Krebsonsecurity
A Connecticut man whos earned "bug bounty" rewards and public recognition from top telecom companies for finding and reporting security holes in their Web sites secretly operated a service that leveraged these same flaws to sell their customers...
Emotet Launches Major New Spam Campaign
9th Nov 2018 [one month ago] from ESET Research
The recent spike in Emotet activity shows that it remains an active threat The post Emotet launches major new spam campaign appeared first on WeLiveSecurity
US Air Force Invites White Hats To Find Hackable Flaws, Again
9th Nov 2018 [one month ago] from ESET Research
This is the third time that the air force wants ethical hackers to uncover chinks in its digital armor The post US Air Force invites white hats to find hackable flaws, again appeared first on WeLiveSecurity
Attack Uses Malicious InPage Document And Outdated VLC Media Player To Give Attackers Backdoor Access To Targets
8th Nov 2018 [one month ago] from Microsoft
Our analysis of a targeted attack that used a language-specific word processor shows why its important to understand and protect against small-scale and localized attacks as well as broad-scale malware campaigns. The attack exploited a...
Cryptocurrency Mining Malware Uses Various Evasion Techniques, Including Windows Installer, As Part Of Its Routine
8th Nov 2018 [one month ago] from TrendMicro
The concept of a stealthy, difficult-to-detect malware operating behind the scenes has proven to be an irresistible proposition for many threat actors, and theyre evidently adding even more techniques, as seen in a cryptocurrency miner...
« Newer 2 3 4 5 6 7 8 9 10 11 Older »